{"id":1452,"date":"2005-10-10T00:00:00","date_gmt":"2005-10-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/10\/10\/pgp-encrypts-blackberry-messaging\/"},"modified":"2021-12-30T11:39:25","modified_gmt":"2021-12-30T11:39:25","slug":"pgp-encrypts-blackberry-messaging","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/10\/10\/pgp-encrypts-blackberry-messaging\/","title":{"rendered":"PGP Encrypts BlackBerry Messaging"},"content":{"rendered":"<p>Encryption specialist PGP Corporation and wireless messaging king Research In Motion (RIM) will bring PGP-secured e-mail to the BlackBerry platform later this year.   PGP Support Package for BlackBerry, developed by RIM, enables enterprises to extend PGP security to individuals who use both laptop\/desktop computers and BlackBerry handhelds.  It provides users with sender-to-recipient e-mail security by complementing the wireless transmission security and device protection already a part of the BlackBerry architecture.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The solution runs in conjunction with PGP Universal, a series of products for enterprises, businesses and departments requiring multiple encryption and digital-signature solutions managed from a single console.  With PGP Universal, enterprises deploy one key infrastructure and may later add new encryption capabilities and devices without changing that infrastructure.<\/p>\n<p>PGP support is fully integrated in the BlackBerry user interface (see top image) and provides e-mail encryption, decryption, digital signature, and verification services for e-mail sent from and received on BlackBerry devices.  Users authenticate themselves with their private key passphrase before decrypting or signing e-mail on their BlackBerry.  Outgoing messages are automatically protected according to a centralized policy specified by the PGP Universal administrator.  PGP Universal uses PGP Additional Decryption Key (ADK) capabilities, automated key management and recovery, and automated enrollment and centralized policy management.<\/p>\n<p>PGP VP of marketing Andrew Krcik told SmartPhoneToday PGP Support Package for BlackBerry will be available as part of the BlackBerry handheld 4.1 operating system next month.<\/p>\n<p>It also requires BlackBerry Enterprise Server for Exchange 4.0.2 or Lotus Notes 4.1 and PGP Universal Series 500 plus PGP Desktop 9.0 or PGP Universal Satelite client to run.<\/p>\n<p>Furthermore, Krcik said PGP brought the idea for the solution to RIM because they shared so many customers and it filled a need requested by many enterprises.  &#8220;BlackBerry is the overwhelming leader for enterprise mobile messaging.  By providing an integrated PGP Universal and BlackBerry solution, we address a strategic requirement of our joint customers,&#8221; according to PGP CEO &#038; President Phillip Dunkelberger.<\/p>\n<p>PGP Support Package for BlackBerry costs $249 per client, with volume discounts available for channel partners.<\/p>\n<p>http:\/\/www.rimroad.com\/articles\/2005\/10\/2005-10-10-PGP-Encrypts-BlackBerry.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1452","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1452"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1452\/revisions"}],"predecessor-version":[{"id":3939,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1452\/revisions\/3939"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}